Various open-source benchmarks by the Phoronix Test Suite v8.8.1 (Hvaler).
Processor: Intel Core i3-2100 @ 3.10GHz (2 Cores / 4 Threads), Motherboard: HP 1588h (J51 v01.35 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 4 x 2048 MB DDR3-1333MT/s Kingston KP223C-ELD, Disk: 500GB Hitachi HDS72105, Graphics: AMD Radeon HD 5550/5570/5630/6510/6610/7570 1GB (157/200MHz), Audio: Realtek ALC662 rev1, Monitor: SAMSUNG, Network: Intel 82579LM
OS: Ubuntu 19.04, Kernel: 5.0.0-25-generic (x86_64), Desktop: GNOME Shell 3.32.0, Display Server: X Server, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
This test will do a simple write/read test on all detected serial interfaces. For this test to work, the relevant serial ports should have a serial loopback plug or have otherwise wired the appropriate pins. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i3-2100 @ 3.10GHz (2 Cores / 4 Threads), Motherboard: HP 1588h (J51 v01.35 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 4 x 2048 MB DDR3-1333MT/s Kingston KP223C-ELD, Disk: 500GB Hitachi HDS72105, Graphics: AMD Radeon HD 5550/5570/5630/6510/6610/7570 1GB (157/200MHz), Audio: Realtek ALC662 rev1, Monitor: SAMSUNG, Network: Intel 82579LM
OS: Ubuntu 19.04, Kernel: 5.0.0-25-generic (x86_64), Desktop: GNOME Shell 3.32.0, Display Server: X Server, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 4 September 2019 03:50 by user root.